Multiple vulnerabilities in Kiali



Published: 2020-04-28
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2020-1762
CVE-2020-1764
CWE-ID CWE-613
CWE-321
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
Subscribe
Kiali
Client/Desktop applications / Other client software

Vendor Kiali

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Insufficient Session Expiration

EUVDB-ID: #VU27379

Risk: High

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-1762

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to an insufficient JWT validation. A remote non-authenticated attacker can steal a valid JWT cookie and gain unauthorized access to session that belongs to another user, possibly gain privileges to view and alter the Istio configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Kiali: 0.4.0 - 1.15.0

External links

http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762
http://kiali.io/news/security-bulletins/kiali-security-001/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use of Hard-coded Cryptographic Key

EUVDB-ID: #VU27380

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-1764

CWE-ID: CWE-321 - Use of Hard-coded Cryptographic Key

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain unauthorized access to the system.

The vulnerability exists due to presence of a hard-coded cryptographic key in the default configuration file. A remote attacker can create their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Kiali: 0.4.0 - 1.15.0

External links

http://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764
http://kiali.io/news/security-bulletins/kiali-security-001/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###